There are 14 repositories under privilege-escalation-exploits topic.
Linux privilege escalation auditing tool
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Collection of things made during my OSCP journey
整理一些内网常用渗透小工具
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Bypass UAC by hijacking a DLL located in the Native Image Cache
Linux Privilege Escalation Tool By WazeHell
system3, Samsung's worst nightmare for a 3rd time!
Bypass UAC by abusing the Internet Explorer Add-on installer
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Privilege escalation in Docker
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Linux & Android Kernel Vulnerability research and exploitation
AppXSVC Service race condition - privilege escalation
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
privilege escalation POCs built in Rust.
x64 Windows privilege elevation using anycall
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC by abusing shell protocol handlers
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
Copy & paste from original code for support ALL Windows Versions
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
Privilege Escalation
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Introduction to information security, exploiting a vulnerable ISO.
Vulnerable Flask E-Commerce Cyber Security Group 120
A list of useful payloads and bypass for Web Application Security and Pentest/CTF